Technologies:

Subscribe

Cybersecurity

Anagram gamifies employee cybersecurity training

Despite annual cybersecurity training courses, human-caused cybersecurity breaches still occur.

Blackwall protects SMBs from malicious online traffic

A large portion of online traffic now comes from bots, both good and bad, with AI powering the latter.

Riot raises for its employee-focused cybersecurity product suite

Originally focused on educating employees about cybersecurity risks, the company now wants to go a step further and push employees to minimize their attack surface.

Subscribe to our newsletter

Deepseek: Countries and agencies that have banned this AI technology

Deepseek’s viral AI models and chatbot applications have been banned by a growing number of countries and government agencies, which have raised concerns about Deepseek’s ethics, privacy and security practices.

UK internet watchdog finalises first rules for online safety law

The UK internet regulator Ofcom has published the first set of final guidelines for online service providers subject to the Online Safety Act. This starts the clock ticking for the first deadline for compliance with the sweeping online harms law, which the regulator expects to come into force within three months.

Cybersecurity research in the media in 2024

Since 2021, we have published a year-end list highlighting the best cybersecurity stories reported by other outlets. Cybersecurity, surveillance, and privacy are huge topics that no single publication can cover effectively, but there are some reports by excellent online journalists that are worth mentioning.

The worst managed data breaches of 2024

We are again listing much of the same bad behavior from a whole new class of companies, plus a few (dis)honorable mentions that...

Snyk with $300 million ARR is in no rush to go public

Several factors might lead you to believe that Snyk, the developer security startup recently valued at $7.400 billion, would soon go public.

Cybersecurity Glossary

This cybersecurity glossary includes some of the most common words and phrases we regularly use in our publications, and explanations of how and why we use them.

2024 will be another record year for ransomware and it is likely to get worse

Despite several law enforcement victories against ransomware actors, such as the sweeping takedown of LockBit and the seizure of Radar, hackers continue to reap the rewards of these data-stealing attacks, and 2024 looks set to be their most profitable year yet.

The biggest underestimated threat today: Persistent teenagers

If you ask some of the leading cybersecurity experts what their top concerns are, you probably wouldn’t expect young, advanced cybercriminals to be the first topic on their mind. However, in recent years, a new generation of profit-motivated cybercriminals has carried out some of the biggest attacks in history and doesn’t seem to be slowing down.

How to make open source software more secure

Earlier this year, a Microsoft developer noticed that someone had inserted a backdoor into the code of the open source utility XZ Utils, which is used in virtually all Linux operating systems.

The 30-year-old Internet backdoor law has backfired

News from late November this year that Chinese-backed hackers have compromised the wiretapping systems of several US internet and telecommunications providers, likely in an effort to gather intelligence on Americans, has surfaced in the media.

Lineaje raises $20 million to combat threats in the software supply chain

Supply chain attacks often target third-party services or open source software that make up a company's IT infrastructure, potentially resulting in serious financial consequences for the organization.

Linx raises $33M to block identity management security perimeter

In recent years, identity management has become one of the fundamental pillars in the fight against security breaches. One of the main reasons for its relevance is the complexity that tracking it represents for organizations, which makes it a coveted target for malicious hackers.

Pindrop, a company for detecting deepfakes, obtains financing to expand its offer

The trend toward deepfakes has benefited companies that offer tools to combat them, as evidenced by the recent $100 million loan to Pindrop from Hercules Capital.

ZeroTier raises $13,5 million to mitigate issues like CrowdStrike

As the CrowdStrike update continues to have a global impact, a new company has managed to raise $13,5 million to improve at least one level of security on the types of devices affected.

The OpenAI data breach is a reminder that AI companies are treasure troves for hackers.

The disclosure of a breach in OpenAI systems raises concerns about obtaining confidential conversations conducted through ChatGPT.

Biggest data breaches in 2024: 1.000 billion records stolen and growing

During the course of 2024, there have been significant data breaches that have had a significant impact. These incidents have been considered some of the most serious in recent history.

Kaspersky closes and will lay off employees after its ban in the country

The renowned cybersecurity service provider of Russian origin, Kaspersky, has announced its decision to reduce its workforce and withdraw from the United States market.

Misinformation proliferates after CrowdStrike service outage

On Friday morning, a widespread computer outage occurred on the East Coast due to a faulty CrowdStrike update. At that time...

The US agency CISA claims that hackers are taking advantage of the CrowdStrike service interruption

The US cybersecurity agency CISA stated that malicious individuals are taking advantage of this incident to carry out activities such as phishing and other malicious actions.

Scams powered by artificial intelligence and how to act

Artificial Intelligence (AI) is presented as a versatile tool that can assist in various tasks, such as composing emails or creating concept art, but it can also be used fraudulently to deceive vulnerable individuals by posing as an acquaintance in need.
spot_img

Trend

Welcome to TRPlane.com

install
×
Enable notifications OK No thanks